Tag Archives: best practices

compiling and making jar files with Ant

When I first saw Java I was surprised at exactly how embarrassingly simple it was to compile a program. Well, with the caveat that the file or files are all in the same directory. javac *.java When the number of … Continue reading

Posted in programming | Tagged , | Comments Off on compiling and making jar files with Ant

getting the most out of your computer – threading

Flashback to 2002 Technology is amazing.  Pretty much since personal computers were created the speed of their processors have been increasing at almost a linear rate of doubling in speed every two years.  This is awesome but it is also … Continue reading

Posted in programming | Tagged , , | Comments Off on getting the most out of your computer – threading

better logging than printf – using log4j – part III

Log4j is a very convenient tool to have in your programming arsenal.  This is true even if only the very basic functionality is being used.    The basic functionality of log4j2 was covered in my previous example. To be honest, … Continue reading

Posted in programming | Tagged , , | Comments Off on better logging than printf – using log4j – part III

better logging than printf – using log4j – part II

However, Just like with computers, cars and women there is always a faster, bigger, or better model on the horizon. Version 1.2 of log4j has reached its end of life on August 5th 2015 but there is a version 2 … Continue reading

Posted in programming | Tagged , , | Comments Off on better logging than printf – using log4j – part II

better logging than printf – using log4j – part I

The old way Log files or debugging can be done using print statements.  It is a very rudimentary way to see some of your internal variables or to have a log of how the program run went. This printf sample … Continue reading

Posted in programming | Tagged , , | Comments Off on better logging than printf – using log4j – part I

safe computing – email

What is computer security?  Techniques for ensuring that computer data is not accessed by unauthorized individuals. This might involve passwords, encryption or physical seclusion. Virtually every other week there is a story in the news about some web site which … Continue reading

Posted in Soapbox | Tagged | Comments Off on safe computing – email